Security configuration for InTouch HMI
- Last UpdatedAug 21, 2025
- 1 minute read
The table below lists the security areas that you need to configure for InTouch HMI and the details of the section(s) in this guide that provide the corresponding instructions.
|
Security Area(s) |
Topic(s) in this guide |
Summary |
|---|---|---|
|
Protecting the Applications and Content on the Host |
Configure WindowViewer to automatically log off an inactive operator from an InTouch application. Inactivity time-out is not supported when connected experience is enabled. |
|
|
Securing Systems through Authentication and Authorization |
Users needs to authenticate themselves before using an InTouch application. InTouch verifies whether the authenticated user is authorized to use specific functionality. |
|
|
Using Virtual Accounts |
Using virtual accounts provides an additional layer of security when accessing alarm functions. See Using Virtual Accounts in the InTouch HMI Alarms and Events Guide. |
|
|
Protecting the Applications and Content on the Host |
Locking System Keys |
Restrict operator access to standard Windows functions by disabling system keys on the computer running an InTouch application. |
|
Securing Systems through Authentication and Authorization |
||
|
Managing Users and Groups through ICS Software |
Restrict which functions an operator is allowed to perform by linking those functions to internal tags. |
|
|
Managing Users and Groups through Windows |
Inherit some user/group account policies from the Windows operating system. |
|
|
Securing the application data folder |
Users can define user roles and user groups to manage access to the application data folder. |